Sciweavers

4445 search results - page 203 / 889
» Reflective Authorization Systems
Sort
View
STOC
2009
ACM
156views Algorithms» more  STOC 2009»
16 years 5 months ago
Polynomial-time theory of matrix groups
We consider matrix groups, specified by a list of generators, over finite fields. The two most basic questions about such groups are membership in and the order of the group. Even...
László Babai, Robert Beals, Á...
115
Voted
KDD
2004
ACM
112views Data Mining» more  KDD 2004»
16 years 5 months ago
A rank sum test method for informative gene discovery
Finding informative genes from microarray data is an important research problem in bioinformatics research and applications. Most of the existing methods rank features according t...
Lin Deng, Jian Pei, Jinwen Ma, Dik Lun Lee
CHI
2008
ACM
16 years 5 months ago
CareLog: a selective archiving tool for behavior management in schools
Identifying the function of problem behavior can lead to the development of more effective interventions. One way to identify the function is through functional behavior assessmen...
Gillian R. Hayes, Lamar M. Gardere, Gregory D. Abo...
POPL
2005
ACM
16 years 5 months ago
Precise interprocedural analysis using random interpretation
We describe a unified framework for random interpretation that generalizes previous randomized intraprocedural analyses, and also extends naturally to efficient interprocedural an...
Sumit Gulwani, George C. Necula
STOC
2006
ACM
130views Algorithms» more  STOC 2006»
16 years 5 months ago
On the fourier tails of bounded functions over the discrete cube
In this paper we consider bounded real-valued functions over the discrete cube, f : {-1, 1}n [-1, 1]. Such functions arise naturally in theoretical computer science, combinatorics...
Irit Dinur, Ehud Friedgut, Guy Kindler, Ryan O'Don...